Lucene search

K
ibmIBM9CFF0C58CC64FD29010860C0FEB80ABE2D640B44743142A4801C51FC6737E5BE
HistoryFeb 09, 2023 - 6:02 p.m.

Security Bulletin: IBM Sterling Connect:Direct for UNIX is vulnerable to denial of service due to FasterXML jackson-databind (CVE-2022-42003, CVE-2022-42004)

2023-02-0918:02:05
www.ibm.com
35
ibm sterling connect:direct
unix
denial of service
fasterxml jackson-databind
cve-2022-42003
cve-2022-42004
vulnerability
upgrade

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.003 Low

EPSS

Percentile

66.3%

Summary

IBM Sterling Connect:Direct for UNIX Install Agent component is vulnerable to denial of service due to FasterXML jackson-databind. FasterXML jackson-databind has been upgraded to version 2.14.1 in IBM Sterling Connect:Direct for UNIX Install Agent component .

Vulnerability Details

CVEID:CVE-2022-42003
**DESCRIPTION:**FasterXML jackson-databind is vulnerable to a denial of service, caused by a lack of a check in the primitive value deserializers when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled. By sending a specially-crafted request using deep wrapper array nesting, a local attacker could exploit this vulnerability to exhaust all available resources.
CVSS Base score: 6.2
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/237662 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:CVE-2022-42004
**DESCRIPTION:**FasterXML jackson-databind is vulnerable to a denial of service, caused by a lack of a check in in the BeanDeserializer._deserializeFromArray function. By sending a specially-crafted request using deeply nested arrays, a local attacker could exploit this vulnerability to exhaust all available resources.
CVSS Base score: 6.2
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/237660 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Sterling Connect:Direct for UNIX 6.2.0.0 - 6.2.0.5.iFix020
IBM Sterling Connect:Direct for UNIX 6.1.0.0 - 6.1.0.4.iFix076
IBM Sterling Connect:Direct for UNIX 6.0.0.0 - 6.0.0.2.iFix144
IBM Sterling Connect:Direct for UNIX 4.3.0.0 - 4.3.0.1.iFix108

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now by upgrading

Product Version Remediation/Fix/Instructions
IBM Sterling Connect:Direct for UNIX 6.2.0 Apply 6.2.0.5.iFix021, available on Fix Central.
IBM Sterling Connect:Direct for UNIX 6.1.0 Apply 6.1.0.4.iFix077, available on Fix Central.
IBM Sterling Connect:Direct for UNIX 6.0.0 Apply 6.0.0.2.iFix145, available on Fix Central.
IBM Sterling Connect:Direct for UNIX 4.3.0 Apply 4.3.0.1.iFix109, available on Fix Central.

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmsterling_connect\Matchdirect6.2.0unix
OR
ibmsterling_connect\Matchdirect6.1.0unix
OR
ibmsterling_connect\Matchdirect6.0.0unix
OR
ibmsterling_connect\Matchdirect4.3.0unix

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.003 Low

EPSS

Percentile

66.3%